{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:27:28Z","timestamp":1740122848075,"version":"3.37.3"},"reference-count":61,"publisher":"Springer Science and Business Media LLC","issue":"13","license":[{"start":{"date-parts":[[2021,3,5]],"date-time":"2021-03-05T00:00:00Z","timestamp":1614902400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2021,3,5]],"date-time":"2021-03-05T00:00:00Z","timestamp":1614902400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100004281","name":"Narodowe Centrum Nauki","doi-asserted-by":"publisher","award":["N N516 367936"],"award-info":[{"award-number":["N N516 367936"]}],"id":[{"id":"10.13039\/501100004281","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004281","name":"Narodowe Centrum Nauki","doi-asserted-by":"publisher","award":["DEC1-2011\/01\/B\/ST6\/06500"],"award-info":[{"award-number":["DEC1-2011\/01\/B\/ST6\/06500"]}],"id":[{"id":"10.13039\/501100004281","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,5]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Electronic documents constitute specific units of information, and protecting them against unauthorized access is a challenging task. This is because a password protected document may be stolen from its host computer or intercepted while on transfer and exposed to unlimited offline attacks. The key issue is, therefore, making document passwords hard to crack. We propose to augment a common text password authentication interface to encrypted documents with a biometric facial identity verification providing highly personalized security mechanism based on pseudo-identities. In consequence the encrypted document can be unlocked with the legitimate user\u2019s face, while for everyone else stays encrypted with a hard to crack text password. This paper makes two contributions: (1) The proposed scheme enables password autofill without referring to any external service, which significantly limits the possibilities of an attack by adversaries when opening, reading and editing the protected document, (2) By the adoption of biometric verification techniques enabling fine-tuning of false acceptance and false rejection rates, it provides for responsible adaptation to users.<\/jats:p>","DOI":"10.1007\/s11042-021-10533-8","type":"journal-article","created":{"date-parts":[[2021,3,5]],"date-time":"2021-03-05T07:03:11Z","timestamp":1614927791000},"page":"20089-20124","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Just look at to open it up:"],"prefix":"10.1007","volume":"80","author":[{"given":"Maciej","family":"Smiatacz","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5798-0252","authenticated-orcid":false,"given":"Bogdan","family":"Wiszniewski","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,5]]},"reference":[{"issue":"7","key":"10533_CR1","doi-asserted-by":"publisher","first-page":"721","DOI":"10.1109\/34.598229","volume":"19","author":"Y Adini","year":"1997","unstructured":"Adini Y, Moses Y, Ullman S (1997) Face recognition: the problem of compensating for changes in illumination direction. IEEE Trans Pattern Anal Mach Intell 19(7):721\u2013732. https:\/\/doi.org\/10.1109\/34.598229","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"unstructured":"Apple Inc. Manage passwords using keychains on Mac. https:\/\/support.apple.com\/guide\/mac-help\/use-keychains-to-store-passwords-mchlf375f392\/mac. Accessed: 2019-12-31","key":"10533_CR2"},{"unstructured":"Arora S, Liang Y, Ma T (2015) Why are deep nets reversible: A simple theory, with implications for training. CoRR arXiv:1511.05653","key":"10533_CR3"},{"unstructured":"Behrmann J, Grathwohl W, Chen RTQ, Duvenaud D, Jacobsen J-H (2019) Invertible residual networks. In: Chaudhuri K, Salakhutdinov R (eds) Proc. 36th Int. Conf. on Machine Learning, vol 97. PMLR, Long Beach, pp 573\u2013582. http:\/\/proceedings.mlr.press\/v97\/behrmann19a.html","key":"10533_CR4"},{"issue":"7","key":"10533_CR5","doi-asserted-by":"publisher","first-page":"711","DOI":"10.1109\/34.598228","volume":"19","author":"PN Belhumeur","year":"1997","unstructured":"Belhumeur PN, Hespanha JP, Kriegman DJ (1997) Eigenfaces vs. Fisherfaces: recognition using class specific linear projection. IEEE Trans Pattern Anal Mach Intell 19(7):711\u2013720. https:\/\/doi.org\/10.1109\/34.598228","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"3","key":"10533_CR6","doi-asserted-by":"publisher","first-page":"970","DOI":"10.1109\/TIFS.2011.2116781","volume":"6","author":"R Biddle","year":"2011","unstructured":"Biddle R, Mannan M, van Oorschot PC, Whalen T (2011) User study, analysis, and usable security of passwords based on digital objects. IEEE Trans Inf Forensic Secur 6(3):970\u2013979","journal-title":"IEEE Trans Inf Forensic Secur"},{"doi-asserted-by":"crossref","unstructured":"Billa JB, Nawar A, Shakil MMH, Das AK (2019) PassMan: A new approach of password generation and management without storing. In: Proc. 7th Int. Conf. on Smart Computing Communications (ICSCC), pp 1\u20135","key":"10533_CR7","DOI":"10.1109\/ICSCC.2019.8843591"},{"unstructured":"Bishop M (2018) Computer security, 2nd edn. Addison-Wesley Professional","key":"10533_CR8"},{"unstructured":"Breebaart J, Busch C, Grave J, Kindt E (2008) A reference architecture for biometric template protection based on pseudo identities. In: Proc. Special Interest Group on Biometrics and Electronic Signatures (BIOSIG 2008), pp 25\u201338","key":"10533_CR9"},{"issue":"11","key":"10533_CR10","doi-asserted-by":"publisher","first-page":"721","DOI":"10.1109\/LSP.2012.2215586","volume":"19","author":"L Ding","year":"2012","unstructured":"Ding L, Ding X, Fang C (2012) Continuous pose normalization for pose-robust face recognition. IEEE Signal Process Lett 19(11):721\u2013724. https:\/\/doi.org\/10.1109\/LSP.2012.2215586","journal-title":"IEEE Signal Process Lett"},{"doi-asserted-by":"publisher","unstructured":"Eastlake 3rd D, Schiller J, Crocker S (2005) Randomness requirements for security. RFC 4086, RFC Editor. https:\/\/doi.org\/10.17487\/RFC4096","key":"10533_CR11","DOI":"10.17487\/RFC4096"},{"unstructured":"Eswaran C, Palaniappan R, Phon-Amnuaisuk S, Ravi KVR (2007) Data encryption using event-related brain signals. In: 2007 Int. Conf. on Computational Intelligence and Multimedia Applications(ICCIMA), vol 1, pp 540\u2013544","key":"10533_CR12"},{"unstructured":"Flor\u00eancio D, Herley C, van Oorschot PC (2014) An administrator\u2019s guide to internet password research. In: Proc. 28th Large Installation System Administration Conf. (LISA14). USENIX Association, Seattle, pp 44\u201361","key":"10533_CR13"},{"issue":"6","key":"10533_CR14","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1109\/34.927464","volume":"23","author":"AS Georghiades","year":"2001","unstructured":"Georghiades AS, Belhumeur PN, Kriegman DJ (June 2001) From few to many: Illumination cone models for face recognition under variable lighting and pose. IEEE Trans Pattern Anal Mach Intell 23(6):643\u2013660","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"doi-asserted-by":"crossref","unstructured":"Godlewska M, Wiszniewski B (2010) Distributed MIND \u2013 a new processing model based on mobile interactive documents. In: Proc. 8th Int. Conf. PPAM 2009, LNCS, vol 6068. Springer, pp 244\u2013249","key":"10533_CR15","DOI":"10.1007\/978-3-642-14403-5_26"},{"key":"10533_CR16","doi-asserted-by":"publisher","first-page":"101700","DOI":"10.1016\/j.cose.2019.101700","volume":"90","author":"M Gomez-Barrero","year":"2020","unstructured":"Gomez-Barrero M, Galbally J (2020) Reversing the irreversible: A survey on inverse biometrics. Comput Secur 90:101700. https:\/\/doi.org\/10.1016\/j.cose.2019.101700","journal-title":"Comput Secur"},{"doi-asserted-by":"crossref","unstructured":"Guo G, Zhang N (2018) What is the challenge for deep learning in unconstrained face recognition? In: 13th IEEE Int. Conf. on Automatic Face Gesture Recognition (FG 2018), pp 436\u2013442","key":"10533_CR17","DOI":"10.1109\/FG.2018.00070"},{"doi-asserted-by":"crossref","unstructured":"Horsch M, H\u00fclsing A, Buchmann J (2015) PALPAS - PAsswordLess PAssword Synchronization. In: Proc. 10th Int. Conf. on Availability, Reliability and Security, ARES \u201915. IEEE Computer Society, Washington, pp 30\u201339","key":"10533_CR18","DOI":"10.1109\/ARES.2015.23"},{"key":"10533_CR19","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1016\/j.infsof.2018.07.007","volume":"104","author":"S Hosseinzadeh","year":"2018","unstructured":"Hosseinzadeh S, Rauti S, Lauren S, M\u00e4kel\u00e4 JM, Holvitie J, Hyrynsalmi S, Lepp\u00e4nen V (2018) Diversification and obfuscation techniques for software security: A systematic literature review. Inf Softw Technol 104:72\u201393","journal-title":"Inf Softw Technol"},{"unstructured":"ISO\/IEC 24745 (2011) Information technology \u2013 Security techniques \u2013 Biometric information protection. Standard ISO\/IEC 24745:2011(en), International Organization for Standardization, Geneva. https:\/\/www.iso.org\/standard\/52946.html","key":"10533_CR20"},{"doi-asserted-by":"crossref","unstructured":"Jeong B, Vallat A, Csikszentmihalyi C, Park J, Pacheco D (2019) MementoKey: Keeping passwords in mind. In: Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems, CHI EA\u201919, pp LBW1316:1\u2013LBW1316:6","key":"10533_CR21","DOI":"10.1145\/3290607.3313066"},{"issue":"6","key":"10533_CR22","doi-asserted-by":"publisher","first-page":"1400","DOI":"10.1109\/TBME.2016.2607020","volume":"64","author":"N Karimian","year":"2017","unstructured":"Karimian N, Guo Z, Tehranipoor M, Forte D (2017) Highly reliable key generation from electrocardiogram (ECG). IEEE Trans Biomed Eng 64(6):1400\u20131411","journal-title":"IEEE Trans Biomed Eng"},{"unstructured":"Kissell J (2019) Take control of your passwords, 3rd edn. Take Control Books","key":"10533_CR23"},{"issue":"1","key":"10533_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s41598-017-14209-y","volume":"7","author":"A Ko\u0142akowska","year":"2017","unstructured":"Ko\u0142akowska A, Landowska A, Anzulewicz A, Sobota K (2017) Automatic recognition of therapy progress among children with autism. Sci Rep 7(1):1\u201314","journal-title":"Sci Rep"},{"issue":"3","key":"10533_CR25","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1109\/12.210173","volume":"42","author":"M Lades","year":"1993","unstructured":"Lades M, Vorbruggen JC, Buhmann J, Lange J, von der Malsburg C, Wurtz RP, Konen W (1993) Distortion invariant object recognition in the dynamic link architecture. IEEE Trans Comput 42(3):300\u2013311","journal-title":"IEEE Trans Comput"},{"doi-asserted-by":"crossref","unstructured":"Lyons M, Akamatsu S, Kamachi M, Gyoba J (1998) Coding facial expressions with Gabor wavelets. In: Proc. 3rd. Int. Conf. on Face & Gesture Recognition, Nara, pp 200\u2013205","key":"10533_CR26","DOI":"10.1109\/AFGR.1998.670949"},{"unstructured":"M. S, R\u00e4tsch G, Weston J, Sch\u00f6lkopf B, M\u00fcller KR (1999) Fisher discriminant analysis with kernels. In: Neural Networks for Signal Processing IX: Proc. 1999 IEEE Signal Processing Society Workshop, pp 41\u201348","key":"10533_CR27"},{"doi-asserted-by":"crossref","unstructured":"Ma J, Yang W, Luo M, Li N (2014) A study of probabilistic password models 2014 IEEE Symp. on Security and Privacy. IEEE Computer Society, San Jose, pp 689\u2013704","key":"10533_CR28","DOI":"10.1109\/SP.2014.50"},{"doi-asserted-by":"crossref","unstructured":"Maclean R, Ophoff J (2018) Determining key factors that lead to the adoption of password managers. In: 2018 Int. Conf. on Intelligent and Innovative Computing Applications (ICONIC), pp 316\u2013322","key":"10533_CR29","DOI":"10.1109\/ICONIC.2018.8601223"},{"unstructured":"Maqbali FA, Mitchell CJ (2017) AutoPass: An automatic password generator. In: 2017 Int. Carnahan Conf. on Security Technology (ICCST), pp 1\u20136","key":"10533_CR30"},{"doi-asserted-by":"crossref","unstructured":"Maqbali F A, Mitchell CJ (2016) Password generators: Old ideas and new. In: Proc. 10th IFIP WG 11.2 Int. Conf. WISTP 2016, LNCS, vol 9895. Springer, Heraklion, pp 245\u2013253","key":"10533_CR31","DOI":"10.1007\/978-3-319-45931-8_16"},{"doi-asserted-by":"crossref","unstructured":"Marky K, Mayer P, Gerber N, Zimmermann V (2018) Assistance in daily password generation tasks. In: Proc. of the 2018 ACM Int. Joint Conf. and 2018 Int. Symp. on Pervasive and Ubiquitous Computing and Wearable Computers, UbiComp\u201918, pp 786\u2013793","key":"10533_CR32","DOI":"10.1145\/3267305.3274127"},{"unstructured":"MathWave Technologies (2017) Easyfit \u2013 distribution fitting made easy. Dnepropetrovsk, Ukraine. http:\/\/www.mathwave.com\/en\/home.html. [Software]","key":"10533_CR33"},{"issue":"5","key":"10533_CR34","doi-asserted-by":"publisher","first-page":"1065","DOI":"10.1109\/TCYB.2015.2423271","volume":"46","author":"L Meng-Hui","year":"2016","unstructured":"Meng-Hui L, Pong CY (2016) Entropy measurement for biometric verification systems. IEEE Trans Cybern 46(5):1065\u20131077","journal-title":"IEEE Trans Cybern"},{"issue":"5","key":"10533_CR35","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1109\/MSP.2015.2427849","volume":"32","author":"K Nandakumar","year":"2015","unstructured":"Nandakumar K, Jain AK (2015) Biometric template protection: Bridging the performance gap between theory and practice. IEEE Signal Proc Mag 32 (5):88\u2013100","journal-title":"IEEE Signal Proc Mag"},{"issue":"1","key":"10533_CR36","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/0031-3203(95)00067-4","volume":"29","author":"T Ojala","year":"1996","unstructured":"Ojala T, Pietikainen M, Harwood D (1996) A comparative study of texture measures with classification based on featured distributions. Pattern Recogn 29(1):51\u201359","journal-title":"Pattern Recogn"},{"unstructured":"PGS (2019) The Carnegie Mellon University Password Research Group\u2019s Password Guessability Service. https:\/\/pgs.ece.cmu.edu","key":"10533_CR37"},{"issue":"10","key":"10533_CR38","doi-asserted-by":"publisher","first-page":"1090","DOI":"10.1109\/34.879790","volume":"22","author":"PJ Phillips","year":"2000","unstructured":"Phillips PJ, Moon H, Rizvi SA, Rauss PJ (October 2000) The FERET evaluation methodology for face-recognition algorithms. IEEE Trans Pattern Anal Mach Intell 22(10):1090\u20131104","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"10533_CR39","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1109\/MCOM.2006.1632652","volume":"44","author":"CY Poon","year":"2006","unstructured":"Poon CY, Zhang YT, Bao SD (2006) A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health. IEEE Commun Mag 44:73\u201381","journal-title":"IEEE Commun Mag"},{"issue":"4","key":"10533_CR40","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1109\/TPAMI.2007.1004","volume":"29","author":"NK Ratha","year":"2007","unstructured":"Ratha NK, Chikkerur S, Connell JH, Bolle RM (2007) Generating cancelable fingerprint templates. IEEE Trans Pattern Anal Mach Intell 29(4):561\u2013572. https:\/\/doi.org\/10.1109\/TPAMI.2007.1004","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"unstructured":"Razavi A, van den Oord A, Vinyals O (2019) Generating diverse high-fidelity images with VQ-VAE-2. CoRR arXiv:1906.00446","key":"10533_CR41"},{"unstructured":"Ross B, Jackson C, Miyake N, Boneh D, Mitchell JC (2005) Stronger password authentication using browser extensions. In: Proc. 14th Conf. on USENIX Security Symp., SSYM\u201905. USENIX Association, Berkeley, pp 17\u201331","key":"10533_CR42"},{"doi-asserted-by":"crossref","unstructured":"Selvakumar AL, Ganadhas CS (2009) The evaluation report of SHA-256 crypt analysis hash function. In: 2009 Int. Conf. on Communication Software and Networks, pp 588\u2013592","key":"10533_CR43","DOI":"10.1109\/ICCSN.2009.50"},{"key":"10533_CR44","doi-asserted-by":"publisher","first-page":"668","DOI":"10.1016\/j.procs.2011.04.070","volume":"4","author":"J Siciarek","year":"2011","unstructured":"Siciarek J, Wiszniewski B (2011) IODA - an interactive open document architecture. Procedia Comput Sci 4:668\u2013677","journal-title":"Procedia Comput Sci"},{"doi-asserted-by":"crossref","unstructured":"Sim T, Baker S, Bsat M (2002) The CMU pose, illumination, and expression (PIE) database. In: Proc. 5th IEEE Int. Conf. on Automatic Face and Gesture Recognition, FGR \u201902, pp 53\u201358","key":"10533_CR45","DOI":"10.1109\/AFGR.2002.1004130"},{"issue":"2","key":"10533_CR46","doi-asserted-by":"publisher","first-page":"257","DOI":"10.2478\/v10178-012-0022-y","volume":"19","author":"M Smiatacz","year":"2012","unstructured":"Smiatacz M (2012) Liveness measurements using optical flow for biometric person authentication. Metrol Measur Syst 19(2):257\u2013268","journal-title":"Metrol Measur Syst"},{"doi-asserted-by":"crossref","unstructured":"Smiatacz M (2013) Eigenfaces, fisherfaces, laplacianfaces, marginfaces \u2013 how to face the face verification task. In: Proc. 8th Int. Conf. on Computer Recognition Systems, CORES 2013. Springer, Heidelberg, pp 187\u2013196","key":"10533_CR47","DOI":"10.1007\/978-3-319-00969-8_18"},{"unstructured":"Solar Designer (2013) John the ripper. Openwall Project. http:\/\/www.openwall.com\/john\/. [Software]","key":"10533_CR48"},{"doi-asserted-by":"crossref","unstructured":"Srivastava S, Sivasankar M (2016) On the generation of alphanumeric one time passwords. In: Proc. Int. Conf. on Inventive Computation Technologies (ICICT), vol 1, pp 1\u20133","key":"10533_CR49","DOI":"10.1109\/INVENTIVE.2016.7823287"},{"unstructured":"Steube J (2018) Hashcat. Hashcat Project. https:\/\/hashcat.net\/oclhashcat\/. [Software]","key":"10533_CR50"},{"doi-asserted-by":"crossref","unstructured":"Taigman Y, Yang M, Ranzato M, Wolf L (2014) DeepFace: Closing the gap to human-level performance in face verification. In: Proc. 2014 IEEE Conf. on Computer Vision and Pattern Recognition, CVPR \u201914. IEEE Computer Society, Washington, pp 1701\u20131708","key":"10533_CR51","DOI":"10.1109\/CVPR.2014.220"},{"issue":"6","key":"10533_CR52","doi-asserted-by":"publisher","first-page":"1635","DOI":"10.1109\/TIP.2010.2042645","volume":"19","author":"X Tan","year":"2010","unstructured":"Tan X, Triggs B (2010) Enhanced local texture feature sets for face recognition under difficult lighting conditions. IEEE Trans Image Process 19(6):1635\u20131650","journal-title":"IEEE Trans Image Process"},{"issue":"2","key":"10533_CR53","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1023\/B:VISI.0000013087.49260.fb","volume":"57","author":"P Viola","year":"2004","unstructured":"Viola P, Jones MJ (2004) Robust real-time face detection. Int J Comput Vis 57(2):137\u2013154","journal-title":"Int J Comput Vis"},{"unstructured":"Walkenbach J (2015) Excel 2016 bible. Wiley","key":"10533_CR54"},{"doi-asserted-by":"crossref","unstructured":"Wang Y, Vangury K, Nikolai J (2014) Mobileguardian: A security policy enforcement framework for mobile devices. In: Proc. 2014 Int. Conf. on Collaboration Technologies and Systems (CTS), pp 197\u2013202","key":"10533_CR55","DOI":"10.1109\/CTS.2014.6867564"},{"doi-asserted-by":"crossref","unstructured":"Weir M, Aggarwal S, Medeiros B, Glodek B (2009) Password cracking using probabilistic context-free grammars. In: 2009 IEEE Symp. on Security and Privacy. IEEE Computer Society, Washington, pp 391\u2013405","key":"10533_CR56","DOI":"10.1109\/SP.2009.8"},{"unstructured":"Wheeler DL (2016) zxcvbn: Low-budget password strength estimation. In: 25th USENIX Security Symp. USENIX Association, Austin, pp 157\u2013173","key":"10533_CR57"},{"doi-asserted-by":"crossref","unstructured":"Whittlesey MA (2019) Spherical geometry and its applications, 1st edn. Chapman and Hall\/CRC","key":"10533_CR58","DOI":"10.1201\/9780429328800-1"},{"doi-asserted-by":"crossref","unstructured":"Yoon S, Jeon Y, Kim J (2015) Mobile security technology for smart devices. In: Proc. 2015 Int. Conf. on Information and Communication Technology Convergence (ICTC), pp 1171\u20131173","key":"10533_CR59","DOI":"10.1109\/ICTC.2015.7354766"},{"issue":"3","key":"10533_CR60","doi-asserted-by":"publisher","first-page":"611","DOI":"10.1109\/TPAMI.2018.2803179","volume":"41","author":"W Zhang","year":"2019","unstructured":"Zhang W, Zhao X, Morvan J, Chen L (2019) Improving shadow suppression for illumination robust face recognition. IEEE Trans Pattern Anal Mach Intell 41(3):611\u2013624. https:\/\/doi.org\/10.1109\/TPAMI.2018.2803179","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"unstructured":"Zhao Y, Schneiderman HW, Andrew SM (2017) Facial recognition (U.S. Patent 8411909B1). published Apr. 2013, assigned to Google LLC","key":"10533_CR61"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10533-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-10533-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10533-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,21]],"date-time":"2021-05-21T06:21:08Z","timestamp":1621578068000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-10533-8"}},"subtitle":["A biometric verification facility for password autofill to protect electronic documents"],"short-title":[],"issued":{"date-parts":[[2021,3,5]]},"references-count":61,"journal-issue":{"issue":"13","published-print":{"date-parts":[[2021,5]]}},"alternative-id":["10533"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-10533-8","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2021,3,5]]},"assertion":[{"value":"28 February 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 October 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 January 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 March 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Conflict of Interests"}}]}}